{"global":{"lastError":{},"locale":"de","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"en":"Products","de":"die produkte","ru":"Продукты","_type":"localeString"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"_type":"localeString","en":"partners","ru":"партнеры"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"_type":"localeString","en":"Categories","ru":"Компетенции"},"description":{"en":"Description","ru":"Описание","_type":"localeString"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"en":"Partnership with suppliers","ru":"Партнерство с поставщиками","_type":"localeString"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"en":"Partner status","ru":"Статус партнёра","_type":"localeString"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"_type":"localeString","en":"number of employees","ru":"количество сотрудников"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"en":"Annual Sales Plan","ru":"Годовой план продаж","_type":"localeString"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"_type":"localeString","en":"Supplied products","ru":"Поставляемые продукты"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"not-yet-converted":{"en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString"},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString"},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"name":"title","translations":{"en":"Company","ru":"Компания","_type":"localeString"}},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"en":"Company keywords","ru":"Ключевые слова для компании","_type":"localeString"}}],"title":{"_type":"localeString","en":"ROI4CIO: Company","ru":"ROI4CIO: Компания"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"ayalon-insurance":{"id":5072,"title":"Ayalon Insurance","logoURL":"https://old.roi4cio.com/uploads/roi/company/ayalon.jpg","alias":"ayalon-insurance","address":"","roles":[{"id":1,"type":"user"}],"description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies throughout Israel. The company is active in all areas of general insurance, life insurance and health insurance. The company has a staff of around 600 employees and the Group as a whole employs some 850 people.","companyTypes":["user"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[{"id":678,"title":"CybeReady for insurance company","description":"Once Ayalon Insurance began working with CybeReady, it was clear to Ahuvia that his staff were being tested using a very sophisticated, covert approach. \r\n“They’re doing an excellent job sending emails that are very hard to resist clicking on,” he said. The results speak for themselves. “CybeReady’s learning pages are very effective,” Ahuvia noted. “By the statistics, we can see that people are paying attention; they’re reading the material. As for their performance in the simulations, it’s definitely improving over time. We can see very clearly that people are much less likely now to click on a phishing scam than they were before we began working with CybeReady. In fact, we can see that those who used to click on almost every phishing email they received have done a complete 180—they don’t click anything now.” \r\n“Honestly, I thought they might be a bit angry if we succeeded—if they clicked on a simulation and we caught them doing something ‘wrong’,” he said. “You know, along the lines of ‘what is this, surveillance?’ But they like it. We’re getting emails from people saying that this was a great simulation; I fell for it, but it was a good one! The engagement level is remarkable.” \r\nWhen a real threat arrives, Ahuvia knows that Ayalon Insurance employees are now better equipped to handle it.","alias":"cybeready-for-insurance-company","roi":0,"seo":{"title":"CybeReady for insurance company","keywords":"","description":"Once Ayalon Insurance began working with CybeReady, it was clear to Ahuvia that his staff were being tested using a very sophisticated, covert approach. \r\n“They’re doing an excellent job sending emails that are very hard to resist clicking on,” he said. The re","og:title":"CybeReady for insurance company","og:description":"Once Ayalon Insurance began working with CybeReady, it was clear to Ahuvia that his staff were being tested using a very sophisticated, covert approach. \r\n“They’re doing an excellent job sending emails that are very hard to resist clicking on,” he said. The re"},"deal_info":"","user":{"id":5072,"title":"Ayalon Insurance","logoURL":"https://old.roi4cio.com/uploads/roi/company/ayalon.jpg","alias":"ayalon-insurance","address":"","roles":[],"description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies throughout Israel. The company is active in all areas of general insurance, life insurance and health insurance. The company has a staff of around 600 employees and the Group as a whole employs some 850 people.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ayalon Insurance","keywords":"","description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies througho","og:title":"Ayalon Insurance","og:description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies througho","og:image":"https://old.roi4cio.com/uploads/roi/company/ayalon.jpg"},"eventUrl":""},"supplier":{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""},"vendors":[{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""}],"products":[{"id":1174,"logo":false,"scheme":false,"title":"CybeReady","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"cybeready","companyTypes":[],"description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to your employees on an ongoing basis. Employees’ reactions are tested using various methods and levels of deception.\r\nPhishing Readiness\r\nIt’s not how much effort you’ve put into training employees, how fast your servers are or how up-to-date your software may be. Cyber security awareness programs often fail because readiness is what matters most. Most organizations invest heavily in awareness programs that encourage employees to excel on tests and to keep security best practices in mind. Yet as readiness is skill-dependent and not awareness-dependent, most of these programs ultimately lead to high levels of awareness and regrettably low levels of performance. When it comes to phishing readiness, the true measurement is hindsight: did you know what to do, and did you react accordingly?\r\nInstant Deployment\r\nWe know that timing and context are of the essence. CybeReady’s training programs are fully customizable and ready for technical testing. Within 48 hours of a purchase order, your branded content and simulation suggestions will be ready for use. We deliver programs in your native language that are customized to fit the specific context of your industry and the regions in which your company operates. Once your program has launched, you’ll receive weekly ‘Readiness Reports’ that contain information on the automated operation and performance of your training programs, along with suggestions from our team.\r\nSmart Learning \r\nYou can only be assured of employees’ readiness with the most rigorous behavioral training, and that requires fully customized content–not templates. CybeReady specializes in highly convincing phishing attacks at varying levels of difficulty–from sector-specific, tailor-made messages to department and position-specific messages, to customer-branded, simulation-specific content that is linguistically and culturally adapted to your needs. With such realistic scenarios, you’ll be well equipped to prepare your employees for any hacker’s diverse approaches to phishing.","shortDescription":"Cyber Readiness: The state of being prepared to handle unexpected cyber events. Cyber readiness is achieved when people are adept at thwarting or minimizing the effect of an unexpected cyber attack.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CybeReady","keywords":"your, that, programs, training, readiness, levels, phishing, employees","description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to yo","og:title":"CybeReady","og:description":"\r\n\r\n\r\nHow It Works\r\nOur core solution takes a customized, three-fold approach to readiness: anti-phishing assessment, monitoring, and training. We send disguised emails using different attack scenario simulations (including both spray and spear phishing) to yo"},"eventUrl":"","translationId":1175,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":178,"title":"No control over data access"},{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":384,"title":"Risk of attacks by hackers"},{"id":281,"title":"No IT security guidelines"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://cybeready.com/wp-content/uploads/2017/04/AyalonInsuranceCaseStudy.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":1124,"title":"CybeReady for Ayalon Insurance","description":"An executive who leads security efforts from the Office of the CIO at Ayalon Insurance knows that exposure to hackers could lead to total catastrophe within seconds. <i>“In the past year, we’ve come to understand that it really doesn’t matter how many technology tools or system safeguards we have in place to defend ourselves; identifying a threat will ultimately fall upon a human being’s shoulders, every time. The firewall and antivirus blocking software we’ve put in place will work, of course. Eventually, however, if a hacker wants to find a way in, then he or she can by baiting our personnel in ways that unknowingly grant access to these criminals.”</i> Ahuvia explained.\r\n<b>The Result.</b> Once Ayalon Insurance began working with CybeReady, it was clear to Ahuvia that his staff were being tested using a very sophisticated, covert approach. “CybeReady’s learning pages are very effective,” Ahuvia noted. “By the statistics, we can see that people are paying attention; they’re reading the material. As for their performance in the simulations, it’s definitely improving over time. We can see very clearly that people are much less likely now to click on a phishing scam than they were before we began working with CybeReady. In fact, we can see that those who used to click on almost every phishing email they received have done a complete 180—they don’t click anything now.” \r\nIn cyber security, staying on top of the latest trends means having a distinct advantage over hackers. A deep understanding of the most recent phishing scams isn’t only helpful; it could mean the difference between a business being vulnerable or successfully thwarting an attack. “We’ve found that the CybeReady team is very knowledgeable about phishing scams happening all around the world; they’re bringing current practices to us before they’re arriving in our inboxes,” Ahuvia said. “When we hear of an attack that happens, we want to know that we already simulated it here and that people are not only aware, but trained to handle it.” ","alias":"cybeready-dlja-ayalon-insurance","roi":0,"seo":{"title":"CybeReady for Ayalon Insurance","keywords":"","description":"An executive who leads security efforts from the Office of the CIO at Ayalon Insurance knows that exposure to hackers could lead to total catastrophe within seconds. <i>“In the past year, we’ve come to understand that it really doesn’t matter how many technolo","og:title":"CybeReady for Ayalon Insurance","og:description":"An executive who leads security efforts from the Office of the CIO at Ayalon Insurance knows that exposure to hackers could lead to total catastrophe within seconds. <i>“In the past year, we’ve come to understand that it really doesn’t matter how many technolo"},"deal_info":"","user":{"id":5072,"title":"Ayalon Insurance","logoURL":"https://old.roi4cio.com/uploads/roi/company/ayalon.jpg","alias":"ayalon-insurance","address":"","roles":[],"description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies throughout Israel. The company is active in all areas of general insurance, life insurance and health insurance. The company has a staff of around 600 employees and the Group as a whole employs some 850 people.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ayalon Insurance","keywords":"","description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies througho","og:title":"Ayalon Insurance","og:description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies througho","og:image":"https://old.roi4cio.com/uploads/roi/company/ayalon.jpg"},"eventUrl":""},"supplier":{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""},"vendors":[{"id":4066,"title":"CybeReady","logoURL":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg","alias":"cybeready","address":"","roles":[],"description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks posed by their most critical asset: people. Our deep understanding and insight into the processes required to manage these risks led to the development of a wide variety of methods, which we use to assist organizations worldwide in adopting information security best practices. ","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":5,"vendorImplementationsCount":5,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cybeready.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"CybeReady","keywords":"CybeReady, risks, organizations, information, security, which, required, insight","description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:title":"CybeReady","og:description":"CybeReady is the outcome of years of collaboration in which we have been exploring the “Human Genome” of Information Security. We founded CybeReady because we believe traditional information security is failing organizations by rarely addressing the risks pose","og:image":"https://old.roi4cio.com/uploads/roi/company/CybeReady.jpg"},"eventUrl":""}],"products":[{"id":5894,"logo":false,"scheme":false,"title":"CybeReady Blast","vendorVerified":0,"rating":"1.00","implementationsCount":4,"suppliersCount":0,"alias":"cybeready-blast","companyTypes":[],"description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in many subsequent ones. The number of attacks that were launched or implemented using phishing is nothing to call, big names and grandiose amounts of losses. If you add fines for this to the loss of user data, these amounts often grow at times.</p>\r\n<p><span style=\"font-weight: bold;\">5 Reasons Your Security Awareness Program Needs Continuous Learning</span></p>\r\n<ul>\r\n<li>Because security awareness education is not a fire drill.</li>\r\n<li>Because the threat landscape is always changing.</li>\r\n<li>Because it’s the only way to truly assess how much your end-users are learning.</li>\r\n<li>Because people learn at different rates.</li>\r\n<li>Because you will learn what works and what doesn’t.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Complete Workforce Training</span></p>\r\n<p>Autonomus training platform continuously trains 100% of employees every month, year-round, using proven methodology and localized, customized content.</p>\r\n<p><span style=\"font-weight: bold;\">Advanced Automation</span></p>\r\n<p>Machine Learning-powered training selects and adjusts training to each employee, including adaptive difficulty level and frequency of training.</p>\r\n<p><span style=\"font-weight: bold;\">Just in Time (JIT) Learning</span></p>\r\n<p>Phishing simulations and short learning sessions in one integrative experience ensure learning ‘in the golden moment’ and eliminate friction with employees.</p>\r\n<p><span style=\"font-weight: bold;\">Guarantees Results</span></p>\r\n<p>Significant change in employee behavior towards cyber attacks: 83% reduction in Serial Clickers, 403% increase in employee resilience score.</p>\r\n<p><span style=\"font-weight: bold;\">Effortless</span></p>\r\n<p>Cybeready’s fully managed solution ensures results yet eliminates IT effort, so you can dedicate valuable resources to other, more challenging tasks.</p>","shortDescription":"The CybeReady’s award-winning solution guarantees to change employee behavior towards phishing attacks while eliminating IT overhead and reducing the total cost of ownership (TCO).","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CybeReady Blast","keywords":"","description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in ","og:title":"CybeReady Blast","og:description":"<p>Phishing in many of its manifestations has been and remains a tool for the initial stage in the chain attack. If we turn to the classical model of the chain attack from Lockheed Martin, then phishing will be present not only at the first stage, but also in "},"eventUrl":"","translationId":5895,"dealDetails":{"avgPartnerDiscount":15,"dealProtection":1,"avgDealSize":15000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is necessary to send to the vendor data of 2 client administrators\r\nAsaf Goldberg | Director of Sales | asaf@cybeready.com","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":346,"title":"Shortage of inhouse IT resources"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0}],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"branches":"Insurance","companySizes":"501 to 1000 Employees","companyUrl":"","countryCodes":["ISR"],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ayalon Insurance","keywords":"","description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies througho","og:title":"Ayalon Insurance","og:description":"The company operates by means of five regional offices – the Tel Aviv district office, the Haifa district office, the Jerusalem district office and the Netanya district office. The company operates through a network of around 1,200 agents and agencies througho","og:image":"https://old.roi4cio.com/uploads/roi/company/ayalon.jpg"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}